Engineer, Identity & Access

Twilio Twilio · Enterprise · India · Remote · IT

This role focuses on integrating, building, and automating Identity and Access Management (IAM) systems to secure enterprise access. The engineer will implement IAM architecture based on Least Privilege Access (LPA) and Zero Trust principles, automate access provisioning/deprovisioning, manage privileged accounts, and ensure compliance with regulatory standards. The role involves working with various technical landscapes, integrating identity platforms with enterprise applications, and participating in on-call rotations.

What you'd actually do

  1. Implement IAM Architecture: Integrate and deploy enterprise-level IAM solutions, APIs, and integrations focused on core security principles, including Least Privilege Access (LPA) and Zero Trust.
  2. Environments: Work across a diverse technical landscape, rapidly deconstruct new environments whether you’re writing logic in a script or a visual canvas. Bridge the gap between custom code and no code platforms.
  3. Prioritize and champion an "Everything-as-Code" mentality for IAM and access management processes, eliminate manual tasks related to access provisioning and deprovisioning by turning it into an automation.
  4. Privileged Access Management (PAM): Actively contribute to developing and maintaining the strategy for managing and securing Privileged Accounts (User and Service Accounts), reducing attack surface area, and enhancing monitoring capabilities.
  5. Compliance & Audit: Lead participation in security audits, risk assessments, and mitigation activities, ensuring all IAM controls meet stringent regulatory and internal compliance standards

Skills

Required

  • 2+ years of progressive experience in Software Engineering, DevOps, or Security Engineering
  • 1+ year of hands-on experience developing production-grade automation scripts and applications using Node.js, JavaScript, or a similar OOP language
  • Proven experience building and operating robust workflows in an Identity Governance platform (e.g., Okta Identity Governance, SailPoint, or similar)
  • Understand and be able to implement or interact with a REST API
  • Hands-on experience with identity management across major cloud providers (AWS, GCP, or Azure).
  • Demonstrated experience implementing and securing solutions for SSO, MFA, IGA and PAM.
  • Practical understanding of modern authentication/authorization protocols (e.g., SAML 2.0, OAuth 2.0, OIDC, SCIM).
  • Experience with Okta, ServicesNow, JIRA, Google, and AWS Workspaces
  • Expertise in modern physical and cloud infrastructure SWE and DevOps industry standards and practices
  • Successful candidates will have experience integrating and deploying a variety of services ensuring adherence to Least Privilege Access (LPA) and Zero Trust security models.

Nice to have

  • Comfortable on being a 'beginner' in new domains. The ability to tackle problems that lie outside our immediate expertise.
  • BS in Computer Science/DevOps Engineering or equivalent professional experience
  • Knowledge of ITIL framework/standard methodologies and ability to understand the concepts of identity management for enterprise systems.
  • Experience with Infrastructure-as-Code (IaC) principles and tools (e.g., Terraform) and container orchestration platforms (Kubernetes/Docker).
  • A strong documentation ethic, capable of creating and maintaining clear, concise runbooks, security procedures, and system architecture documentation.
  • Adopt engineering best practices to deliver, secure, maintainable and scalable software. (e.g., GIT, CI/CD, AGILE)
  • Ability to collaborate with resources across multiple disciplines
  • A passion for security technology, a love for helping people, and an unwavering attention to detail necessary for maintaining a secure environment.

What the JD emphasized

  • Least Privilege Access (LPA)
  • Zero Trust
  • Everything-as-Code
  • Privileged Accounts
  • regulatory compliance